code visual cryptography scheme for color images
#1
Wink 

Hi am madhavi i would like to get details on code visual cryptography scheme for color images ..My friend Justin said code visual cryptography scheme for color images will be available here and now i am living in secunderabad and i am studying in the malla readdy engineering college. and now am doing  project on visual cryptography (2,2) scheme to prevent phishing attacks i need help to work on this project
Reply
#2
A new cryptographic scheme proposed to ensure colour image-based visual cryptographic scheme. A colour image to protect and a binary image used as a key to encrypt and decrypt are taken as input. A secret colour image that needs to be communicated is decomposed into three monochrome images based on the YCbCr colour space. These monochromatic images are then converted into a binary image, and finally the obtained binary images are encrypted using a binary key image, called share-1, to obtain binary cipher images.


To encrypt the exclusive EX operation is performed between binary key image and three secret color image semitones separately. These binary images are combined to get share-2. In decryption the actions are decrypted, then the recovered binary images are inverse in halftone and combined to obtain a secret color image. This scheme is more efficient for the communication of natural images through doubtful channels.

The Visual Cryptography (VC) scheme is used to encode a secret image into several parts, each of which does not reveal any information from the secret image. Actions are printed on transparencies, for example, and distributed to participants. The secret image can easily be deciphered only by betting the parts in an arbitrary order. This property does not need decryption computation. The basic concept of visual cryptography [6] states that a secret message is divided into n partitions, share1, share2, ... and share n, which are seen as random images of noise. Here a secret contains two lighting levels: bright areas are marked with level 0.5 and level 0 is used to represent dark areas.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: ppt and seminar on encription and decription of color images using visual cryptography,
Popular Searches: multipixle visual cryptography for images with meaningfull shares, visual thersold scheme for color image in wikipedia, visual cryptography scheme with dynamic group, color cryptography imnovativa color ieee paper, color scheme authentication project source code, source code for sharing the images in visual cryptography scheme, visual cryptography for color images,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  er diagram for credit card fraud detection images 0 7,487 04-11-2018, 06:13 PM
Last Post: Guest
  full project on enhancing lan using cryptography and other modules 0 621 16-08-2018, 01:19 PM
Last Post: Guest
  images of vamsha vruksha certificate of nada kacheri 0 624 15-08-2018, 12:56 AM
Last Post: Guest
  toll plaza management system in visual basic with source code 0 628 14-08-2018, 02:36 PM
Last Post: Guest
  images of vamsha vruksha certificate of nada kacheri 0 526 17-07-2018, 05:39 PM
Last Post: Guest
  enhancing lan using cryptography and other modules ppt download for free 0 674 06-07-2018, 09:12 AM
Last Post: Guest
  images of vamsha vruksha certificate of nada kacheri 0 573 24-06-2018, 03:13 PM
Last Post: Guest
  visual cryptography steganography matlab 0 447 01-05-2018, 02:48 PM
Last Post: Guest
  exam seating arrangement project visual basic 6 0 0 412 31-03-2018, 03:17 PM
Last Post: Guest
  ppt of mobile voting system using iris recognition and cryptography techniques 0 414 15-03-2018, 01:46 PM
Last Post: Guest

Forum Jump: